SlideShare a Scribd company logo
AFTER THE WEBINAR PLEASE FILL OUT OUR SURVEY!
WE VALUE YOUR
Ransomware-Proof Your AWS Cloud
with the Ultimate Disaster Recovery Strategy
Brought to you by:
Today’s expert presenters
#1 AWS Backup
Vitaly Lyaskovsky
• Director of Technical Support at N2WS
• Cloud & Disaster Recovery Expert
• 20+ years of experience specializing in
Cloud/Enterprise Security solutions
• Previously at IBM, FilesX, Intel
Today’s expert presenters
#1 AWS Backup
Mike Somerville
• Chief Cloud Evangelist & IT Manager of
Systems/Support University of San Diego
• 20+ years experience in leading the
adoption of cloud services and providing
innovative cloud solutions
• Founder and Chief Architect at several
cloud computing consulting firms
Understanding the
Risk of Ransomware
#1 AWS Backup
The costly growth of cyber-crime
#1 AWS Backup
Ransomware is the fastest growing
type of cybercrime.
$20 billion in 2021. This is up
from just $325 million in 2015.
The evolution of ransomware
#1 AWS Backup
Ransomware is a top concern for organizations with CryptoLocker
(2014), Petya (2016), WannaCry (2017), notPetya (2017), Ryuk (2019)
First instance of ransomware (1989) had simple encryption tools and user
interaction was necessary. Now more complicated, using complex
algorithms, no interaction necessary.
Ransomware = malicious code designed to gain unauthorized data
access and encrypt data to block access by legitimate users
Current trends include RaaS, cryptocurrency mining
Concerning ransomware stats
#1 AWS Backup
A company gets hit every 40 seconds
50% of organizations attacked by
ransomware are hit more than once
$532,914 is the average ransomware recovery cost
23 days is the average amount of time to recover data!
!
!
!
The biggest cost isn’t the ransom
#1 AWS Backup
• Data damage
• Restoration of host systems and data
• Downtime due to attacks (no productivity/revenue)
• Forensic investigation
• Damage to the reputations of victims
Downtime creates loss of productivity of users and responders, exposure
of sensitive data, loss of revenue – current and future costs include:
*Loss of productivity & non-availability is the primary business impact of ransomware
The Code Spaces nightmare
#1 AWS Backup
Code Spaces went out of business
12 hours after the attack took place
Backups were performed BUT cross
account backups were not created
NotPetya forced shipping giant Maersk to
reinstall 4,000 servers and 45,000 PCs for $300
million due to "serious business interruption”
#1 AWS Backup
Baltimore ransomware attack will cost the city
over $18 million (and counting...)
Riviera Beach and Lake City Florida will pay hackers $1M
combined to (maybe?) get its computer systems back
What about more recent attacks?
*All attacks were due to lack of strong security/backup practices
!
!
!
To pay or not to pay the ransom?
#1 AWS Backup
MYTH: Paying ransom guarantees your data back
Only 42% of companies report being able
to fully recover data after an attack
Many times bad guys will attack a 2nd time
knowing they can extort another payment
TRUTH: The only guarantee of returning your data is to have a
reliable backup & recovery solution in place.
The Need for Backup
and Restore on AWS
#1 AWS Backup
Do I really need to backup in AWS?
#1 AWS Backup
MYTH: I don’t need to backup Amazon EBS,
because it’s so redundant I’ll never lose data
TRUTH: EBS is designed for an annual failure
rate of about 1/1000. But more common
than that are these risks…
AWS Shared Responsibility Model
AWS provides the virtual
hardware and protects
that infrastructure
But the data you store within
it is YOUR responsibility –this
often goes unrealized
#1 AWS Backup
How does data loss happen in the cloud?
#1 AWS Backup
Compliance + Data Security
EBS Failure
Ransomware AZ Failure
Human Error/
Malicious intent
Reduce the Risk of a
Ransomware Attack
#1 AWS Backup
Internal Awareness
#1 AWS Backup
 Get training!
 Have a security awareness person/program to
deploy regular phishing tests. (Phishing emails
are becoming both more clever and pervasive).
 Implement anti-phishing software in your
backend.
Improve user awareness
Phishing
Prevention
#1 AWS Backup
 Install anti-malware software
 Engage email filtering, web blocking, etc.
 Keep your software and hardware up to date
Improve both backend and end-user technologies:
Malware
“Ransomware-Proofing” your Cloud
with AWS Backup & Recovery
#1 AWS Backup
#1 AWS Backup
Backup Terms
RTO – Recovery Time Objective
RPO – Recovery Point Objective
Application Consistent Backup – Quickly “quiesce” the applications
to allow complete backups that capture all transactions in process
Crash Consistent Backup –General backup of instances, to restore
as if the power cord had been pulled
Offsite Backup – Backups that are stored in a physically distinct
location to the production environment
#1 AWS Backup
AWS global infrastructure
21 regions worldwide, 66 availability zones, 180 POPs
• Latency
• Compliance
• Cost
Select your region based on:
#1 AWS Backup
Some benefits of backup and restore on AWS
#1 AWS Backup
Usage-based fees
pay ONLY for what
you’re using each
month
Low cost
Scale automatically
no need to
manually scale up
or scale down
Scalable
Hardware-free
no need to
buy/maintain on-
premises hardware
Easy
Encrypt data
to tightly control
access and increase
security
Secure
About N2WS
HQ
Palm Beach
FL | USA
Edinburgh
UK
Haifa
Israel
• Founded in 2012
• #1 Backup & Recovery Solution on the
AWS Marketplace
• Purpose-built for AWS
• Distributed via AWS Marketplace
#1 AWS Backup
The “promise of the cloud”, delivered
#1 AWS Backup
Used by AWS builders, worldwide
AWS Accounts
5K+
Petabytes of Backup
13+
HUNDREDS of
THOUSANDS of
Protected Instances
#1 AWS Backup
Your giant recovery button
Automated policies and
schedules
Configure what to back up and when
- define backup targets, set backup
frequency and retention periods
Cross-region & cross-
account DR
Replicate snapshots to one more
regions and recover quickly in
the event of an issue
VPC Capture
and clone
Configure regular backups of
VPC settings and recover to
any region
#1 AWS Backup
Protect against regional outages
#1 AWS Backup
Use cross-region DR
• Protect against region
failure
Protect against account compromises
#1 AWS Backup
Use cross-account DR
• Protect against
account compromise
Protect against ANY type of data loss
#1 AWS Backup
Use BOTH cross-region
and cross-account DR to
create a highly secure
“Snapshot Vault”
• Protect against BOTH
region failure and
account compromise
Top cost saving features
Archive snapshots to
S3 buckets
Save big on your AWS storage bill
by copying EBS snapshots to a
low-cost S3 repository
Start/stop instances on
demand
Stay compliant for
less
Store data for as long as you
need while paying a third of
the standard cost
Reduce your AWS bill by turning off
non-critical EC2/RDS instances
automatically or on-demand
#1 AWS Backup
How University of San Diego
Ransomware-Proofed Using
AWS & N2WS #1 AWS Backup
Servers (Linux &
Windows)
500
Onsite data centers
4
Offsite data
center
1
Journey to the Cloud
#1 AWS Backup
Main ERM Systems
2
Students
8900
Recoverability
#1 AWS Backup
Ransomware attacks will continue to adapt and evolve. All
enterprise data should be backed up, available and
recoverable.
Have a recovery scenario in place with frequent backups,
minimal manual interference, minimal RTO, and minimal
downtime
Production Account
Region 1 - CA
Region 2 - OR
Amazon EC2
instances
#1 AWS Backup
Basic DR Strategy using N2WS
AWS EBS
Snapshots
Amazon RDS
instances
AWS EBS
Snapshots
Development Account
Region 1 - CA
Region 2 - OR
Amazon EC2
instances
AWS EBS
Snapshots
Amazon RDS
instances
AWS EBS
Snapshots
Using AWS Snapshots to
backup EC2 and RDS
Backup volume snapshot
scheduled 2x/day
Crash-consistent +
application-consistent
on backup volume
#1 AWS Backup
Main advantages of N2WS
With archive-to-S3
& Resource Control
you can save up to
60% on costs
Cost Savings
Responsive support
and customer-
focused product
roadmap
Customer focused
Easy install from
AWS Marketplace
takes less than 30
minutes to deploy
Deployment Ease
Near-instant
recovery of entire
volumes or single
files in 1 click
Disaster Recovery
The N2WS Advantage and an
End to Downtime
#1 AWS Backup
The Problem
Modern ransomware attacks disable known
backup products before encrypting data.
#1 AWS Backup
#1 AWS Backup
Even if your N2WS Server is somehow compromised - a new
N2WS server can restore from snapshots that were created by
an old N2WS Server, using metadata that is automatically
backed up already.
And N2WS backups can be restored even without N2WS -
using EC2 console (for native snapshots) or Veeam B&R (for S3).
N2WS: Your Ransomware Secret Weapon
#1 AWS Backup
N2WS Advantages Against Ransomware
Backups aren't kept on any Windows/Linux machine, or
network share – so an attacker can't destroy them!
Backups can continue to run even if N2WS Agent is disabled
Even without an active Agent, backups are fully restorable
Key Takeaways
Cloud environments need a reliable, flexible and automated
solution to manage backups
N2WS Backup & Recovery provides an easy, scalable and
efficient way to manage snapshot-based backup in AWS
The best ammo to disrupt Ransomware is to take regular
backups and have a rapid DR plan in place
#1 AWS Backup
Email us with any questions: info@n2ws.com
Please take 1 minute to fill out our survey!
Talk to us!
Sign up for our fully-featured v2.6 solution by
spinning up a 30-day FREE TRIAL  n2ws.com/trial
#1 AWS Backup
Stay tuned for our upcoming Ransomware webinar
Part 2!

More Related Content

What's hot

AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
Amazon Web Services
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
Amazon Web Services
 
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Amazon Web Services
 
AWS networking fundamentals
AWS networking fundamentalsAWS networking fundamentals
AWS networking fundamentals
Amazon Web Services
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
Amazon Web Services
 
SRV321 Deep Dive on Amazon EBS
 SRV321 Deep Dive on Amazon EBS SRV321 Deep Dive on Amazon EBS
SRV321 Deep Dive on Amazon EBS
Amazon Web Services
 
회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트:: AWS Summit O...
회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트::  AWS Summit O...회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트::  AWS Summit O...
회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트:: AWS Summit O...
Amazon Web Services Korea
 
AWS Direct Connect
AWS Direct ConnectAWS Direct Connect
AWS Direct Connect
Amazon Web Services
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Amazon Web Services
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
Amazon Web Services
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standard
arnaudlh
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
Amazon Web Services
 
Event driven microservices
Event driven microservicesEvent driven microservices
Event driven microservices
Anthony Martin
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWS
Amazon Web Services
 
Transparency and Auditing on AWS
Transparency and Auditing on AWSTransparency and Auditing on AWS
Transparency and Auditing on AWS
Amazon Web Services
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
 

What's hot (20)

AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
 
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
AWS networking fundamentals
AWS networking fundamentalsAWS networking fundamentals
AWS networking fundamentals
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
SRV321 Deep Dive on Amazon EBS
 SRV321 Deep Dive on Amazon EBS SRV321 Deep Dive on Amazon EBS
SRV321 Deep Dive on Amazon EBS
 
AWS Networking Fundamentals
AWS Networking FundamentalsAWS Networking Fundamentals
AWS Networking Fundamentals
 
회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트:: AWS Summit O...
회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트::  AWS Summit O...회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트::  AWS Summit O...
회사 계정/패스워드 그대로 AWS 관리 콘솔 및 EC2 인스턴스 사용하기 - 이정훈, AWS 솔루션즈 아키텍트:: AWS Summit O...
 
AWS Direct Connect
AWS Direct ConnectAWS Direct Connect
AWS Direct Connect
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standard
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Event driven microservices
Event driven microservicesEvent driven microservices
Event driven microservices
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWS
 
Transparency and Auditing on AWS
Transparency and Auditing on AWSTransparency and Auditing on AWS
Transparency and Auditing on AWS
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 

Similar to How to Ransomware-Proof your AWS Cloud

Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
OK2OK
 
Immutable Backups Slides.pptx
Immutable Backups Slides.pptxImmutable Backups Slides.pptx
Immutable Backups Slides.pptx
BrandonDavies10
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS session
OK2OK
 
Ransomeware Recovery by Veeam
Ransomeware Recovery by VeeamRansomeware Recovery by Veeam
Ransomeware Recovery by Veeam
Tanawit Chansuchai
 
Avoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing Chaos
OK2OK
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Amazon Web Services
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
Samir Jhaveri
 
Orchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverlessOrchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverless
martinfoster
 
Encryption in the Cloud
Encryption in the CloudEncryption in the Cloud
Encryption in the Cloud
SVForum Cloud SIG
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud Innovations
Amazon Web Services
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
Melina Black
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
Amazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Amazon Web Services
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
Hostway|HOSTING
 
5 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 20195 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 2019
OK2OK
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
Eric Smalling
 
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
OK2OK
 
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Sandeep Patil
 
How to prepare for & respond to security incidents in your AWS environment
 How to prepare for & respond to security incidents in your AWS environment How to prepare for & respond to security incidents in your AWS environment
How to prepare for & respond to security incidents in your AWS environment
Nathan Case
 
How Notre Dame Maintains Uptime on AWS: A Master Class
 How Notre Dame Maintains Uptime on AWS: A Master Class How Notre Dame Maintains Uptime on AWS: A Master Class
How Notre Dame Maintains Uptime on AWS: A Master Class
Amazon Web Services
 

Similar to How to Ransomware-Proof your AWS Cloud (20)

Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Immutable Backups Slides.pptx
Immutable Backups Slides.pptxImmutable Backups Slides.pptx
Immutable Backups Slides.pptx
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS session
 
Ransomeware Recovery by Veeam
Ransomeware Recovery by VeeamRansomeware Recovery by Veeam
Ransomeware Recovery by Veeam
 
Avoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing Chaos
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
 
Orchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverlessOrchestrated - multi tenant architecture at scale with serverless
Orchestrated - multi tenant architecture at scale with serverless
 
Encryption in the Cloud
Encryption in the CloudEncryption in the Cloud
Encryption in the Cloud
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud Innovations
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
5 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 20195 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 2019
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
 
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
 
How to prepare for & respond to security incidents in your AWS environment
 How to prepare for & respond to security incidents in your AWS environment How to prepare for & respond to security incidents in your AWS environment
How to prepare for & respond to security incidents in your AWS environment
 
How Notre Dame Maintains Uptime on AWS: A Master Class
 How Notre Dame Maintains Uptime on AWS: A Master Class How Notre Dame Maintains Uptime on AWS: A Master Class
How Notre Dame Maintains Uptime on AWS: A Master Class
 

More from OK2OK

NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver! NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
OK2OK
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
OK2OK
 
On-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS MigrationsOn-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS Migrations
OK2OK
 
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & DemoNEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
OK2OK
 
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWSThe accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
OK2OK
 
NEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & DemoNEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & Demo
OK2OK
 
Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS
OK2OK
 
How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...
OK2OK
 
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
OK2OK
 
Cloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationCloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload Automation
OK2OK
 

More from OK2OK (10)

NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver! NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
 
On-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS MigrationsOn-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS Migrations
 
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & DemoNEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
 
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWSThe accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
 
NEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & DemoNEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & Demo
 
Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS
 
How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...
 
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
 
Cloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationCloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload Automation
 

Recently uploaded

Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 

Recently uploaded (20)

Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 

How to Ransomware-Proof your AWS Cloud

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. AFTER THE WEBINAR PLEASE FILL OUT OUR SURVEY! WE VALUE YOUR
  • 10. Ransomware-Proof Your AWS Cloud with the Ultimate Disaster Recovery Strategy Brought to you by:
  • 11. Today’s expert presenters #1 AWS Backup Vitaly Lyaskovsky • Director of Technical Support at N2WS • Cloud & Disaster Recovery Expert • 20+ years of experience specializing in Cloud/Enterprise Security solutions • Previously at IBM, FilesX, Intel
  • 12. Today’s expert presenters #1 AWS Backup Mike Somerville • Chief Cloud Evangelist & IT Manager of Systems/Support University of San Diego • 20+ years experience in leading the adoption of cloud services and providing innovative cloud solutions • Founder and Chief Architect at several cloud computing consulting firms
  • 13. Understanding the Risk of Ransomware #1 AWS Backup
  • 14. The costly growth of cyber-crime #1 AWS Backup Ransomware is the fastest growing type of cybercrime. $20 billion in 2021. This is up from just $325 million in 2015.
  • 15. The evolution of ransomware #1 AWS Backup Ransomware is a top concern for organizations with CryptoLocker (2014), Petya (2016), WannaCry (2017), notPetya (2017), Ryuk (2019) First instance of ransomware (1989) had simple encryption tools and user interaction was necessary. Now more complicated, using complex algorithms, no interaction necessary. Ransomware = malicious code designed to gain unauthorized data access and encrypt data to block access by legitimate users Current trends include RaaS, cryptocurrency mining
  • 16. Concerning ransomware stats #1 AWS Backup A company gets hit every 40 seconds 50% of organizations attacked by ransomware are hit more than once $532,914 is the average ransomware recovery cost 23 days is the average amount of time to recover data! ! ! !
  • 17. The biggest cost isn’t the ransom #1 AWS Backup • Data damage • Restoration of host systems and data • Downtime due to attacks (no productivity/revenue) • Forensic investigation • Damage to the reputations of victims Downtime creates loss of productivity of users and responders, exposure of sensitive data, loss of revenue – current and future costs include: *Loss of productivity & non-availability is the primary business impact of ransomware
  • 18. The Code Spaces nightmare #1 AWS Backup Code Spaces went out of business 12 hours after the attack took place Backups were performed BUT cross account backups were not created
  • 19. NotPetya forced shipping giant Maersk to reinstall 4,000 servers and 45,000 PCs for $300 million due to "serious business interruption” #1 AWS Backup Baltimore ransomware attack will cost the city over $18 million (and counting...) Riviera Beach and Lake City Florida will pay hackers $1M combined to (maybe?) get its computer systems back What about more recent attacks? *All attacks were due to lack of strong security/backup practices ! ! !
  • 20. To pay or not to pay the ransom? #1 AWS Backup MYTH: Paying ransom guarantees your data back Only 42% of companies report being able to fully recover data after an attack Many times bad guys will attack a 2nd time knowing they can extort another payment TRUTH: The only guarantee of returning your data is to have a reliable backup & recovery solution in place.
  • 21. The Need for Backup and Restore on AWS #1 AWS Backup
  • 22. Do I really need to backup in AWS? #1 AWS Backup MYTH: I don’t need to backup Amazon EBS, because it’s so redundant I’ll never lose data TRUTH: EBS is designed for an annual failure rate of about 1/1000. But more common than that are these risks…
  • 23. AWS Shared Responsibility Model AWS provides the virtual hardware and protects that infrastructure But the data you store within it is YOUR responsibility –this often goes unrealized #1 AWS Backup
  • 24. How does data loss happen in the cloud? #1 AWS Backup Compliance + Data Security EBS Failure Ransomware AZ Failure Human Error/ Malicious intent
  • 25. Reduce the Risk of a Ransomware Attack #1 AWS Backup
  • 26. Internal Awareness #1 AWS Backup  Get training!  Have a security awareness person/program to deploy regular phishing tests. (Phishing emails are becoming both more clever and pervasive).  Implement anti-phishing software in your backend. Improve user awareness Phishing
  • 27. Prevention #1 AWS Backup  Install anti-malware software  Engage email filtering, web blocking, etc.  Keep your software and hardware up to date Improve both backend and end-user technologies: Malware
  • 28. “Ransomware-Proofing” your Cloud with AWS Backup & Recovery #1 AWS Backup
  • 30. Backup Terms RTO – Recovery Time Objective RPO – Recovery Point Objective Application Consistent Backup – Quickly “quiesce” the applications to allow complete backups that capture all transactions in process Crash Consistent Backup –General backup of instances, to restore as if the power cord had been pulled Offsite Backup – Backups that are stored in a physically distinct location to the production environment #1 AWS Backup
  • 31. AWS global infrastructure 21 regions worldwide, 66 availability zones, 180 POPs • Latency • Compliance • Cost Select your region based on: #1 AWS Backup
  • 32. Some benefits of backup and restore on AWS #1 AWS Backup Usage-based fees pay ONLY for what you’re using each month Low cost Scale automatically no need to manually scale up or scale down Scalable Hardware-free no need to buy/maintain on- premises hardware Easy Encrypt data to tightly control access and increase security Secure
  • 33. About N2WS HQ Palm Beach FL | USA Edinburgh UK Haifa Israel • Founded in 2012 • #1 Backup & Recovery Solution on the AWS Marketplace • Purpose-built for AWS • Distributed via AWS Marketplace #1 AWS Backup
  • 34. The “promise of the cloud”, delivered #1 AWS Backup
  • 35. Used by AWS builders, worldwide AWS Accounts 5K+ Petabytes of Backup 13+ HUNDREDS of THOUSANDS of Protected Instances #1 AWS Backup
  • 36. Your giant recovery button Automated policies and schedules Configure what to back up and when - define backup targets, set backup frequency and retention periods Cross-region & cross- account DR Replicate snapshots to one more regions and recover quickly in the event of an issue VPC Capture and clone Configure regular backups of VPC settings and recover to any region #1 AWS Backup
  • 37. Protect against regional outages #1 AWS Backup Use cross-region DR • Protect against region failure
  • 38. Protect against account compromises #1 AWS Backup Use cross-account DR • Protect against account compromise
  • 39. Protect against ANY type of data loss #1 AWS Backup Use BOTH cross-region and cross-account DR to create a highly secure “Snapshot Vault” • Protect against BOTH region failure and account compromise
  • 40. Top cost saving features Archive snapshots to S3 buckets Save big on your AWS storage bill by copying EBS snapshots to a low-cost S3 repository Start/stop instances on demand Stay compliant for less Store data for as long as you need while paying a third of the standard cost Reduce your AWS bill by turning off non-critical EC2/RDS instances automatically or on-demand #1 AWS Backup
  • 41. How University of San Diego Ransomware-Proofed Using AWS & N2WS #1 AWS Backup
  • 42. Servers (Linux & Windows) 500 Onsite data centers 4 Offsite data center 1 Journey to the Cloud #1 AWS Backup Main ERM Systems 2 Students 8900
  • 43. Recoverability #1 AWS Backup Ransomware attacks will continue to adapt and evolve. All enterprise data should be backed up, available and recoverable. Have a recovery scenario in place with frequent backups, minimal manual interference, minimal RTO, and minimal downtime
  • 44. Production Account Region 1 - CA Region 2 - OR Amazon EC2 instances #1 AWS Backup Basic DR Strategy using N2WS AWS EBS Snapshots Amazon RDS instances AWS EBS Snapshots Development Account Region 1 - CA Region 2 - OR Amazon EC2 instances AWS EBS Snapshots Amazon RDS instances AWS EBS Snapshots Using AWS Snapshots to backup EC2 and RDS Backup volume snapshot scheduled 2x/day Crash-consistent + application-consistent on backup volume
  • 45. #1 AWS Backup Main advantages of N2WS With archive-to-S3 & Resource Control you can save up to 60% on costs Cost Savings Responsive support and customer- focused product roadmap Customer focused Easy install from AWS Marketplace takes less than 30 minutes to deploy Deployment Ease Near-instant recovery of entire volumes or single files in 1 click Disaster Recovery
  • 46. The N2WS Advantage and an End to Downtime #1 AWS Backup
  • 47. The Problem Modern ransomware attacks disable known backup products before encrypting data. #1 AWS Backup
  • 48. #1 AWS Backup Even if your N2WS Server is somehow compromised - a new N2WS server can restore from snapshots that were created by an old N2WS Server, using metadata that is automatically backed up already. And N2WS backups can be restored even without N2WS - using EC2 console (for native snapshots) or Veeam B&R (for S3). N2WS: Your Ransomware Secret Weapon
  • 49. #1 AWS Backup N2WS Advantages Against Ransomware Backups aren't kept on any Windows/Linux machine, or network share – so an attacker can't destroy them! Backups can continue to run even if N2WS Agent is disabled Even without an active Agent, backups are fully restorable
  • 50. Key Takeaways Cloud environments need a reliable, flexible and automated solution to manage backups N2WS Backup & Recovery provides an easy, scalable and efficient way to manage snapshot-based backup in AWS The best ammo to disrupt Ransomware is to take regular backups and have a rapid DR plan in place #1 AWS Backup
  • 51. Email us with any questions: info@n2ws.com Please take 1 minute to fill out our survey! Talk to us! Sign up for our fully-featured v2.6 solution by spinning up a 30-day FREE TRIAL  n2ws.com/trial #1 AWS Backup Stay tuned for our upcoming Ransomware webinar Part 2!